CVE-2025-9871

Razer Synapse 3 Chroma Connect Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Razer Synapse 3. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Razer Chroma SDK installer. By creating a symbolic link, an attacker can abuse the installer to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-26373.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:razer:synapse:*:*:*:*:*:*:*:*

History

06 Nov 2025, 19:34

Type Values Removed Values Added
CPE cpe:2.3:a:razer:synapse:*:*:*:*:*:*:*:*
References () https://www.zerodayinitiative.com/advisories/ZDI-25-920/ - () https://www.zerodayinitiative.com/advisories/ZDI-25-920/ - Third Party Advisory
First Time Razer synapse
Razer

Information

Published : 2025-10-29 20:15

Updated : 2025-11-06 19:34


NVD link : CVE-2025-9871

Mitre link : CVE-2025-9871

CVE.ORG link : CVE-2025-9871


JSON object : View

Products Affected

razer

  • synapse
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')